Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use.

Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper use. Start by stating what the algorithm does and give a use case where either MD5 or SHA-1 has a best fit condition. MD5 or SHA-1 algorithms both are the hash functions and these functions are used to secure the files or the group of files. In MD5 message of a particular length is encoded into message digest or fingerprint which produces the 128-bit output and SHA-1 algorithm produces an output of 160- bits. These are used in various communication protocols where data integrity, authentication of user and other features of security are required. As the whole message is encrypted into the message digest to attain the authentication, this message digest was created by registering with the trusted third- party.